Implementations of cryptographic modules, Other Subject


Cryptographic modules which realize this standard shall conform to the necessities of FIPS 140-1. The algorithm specific in this standard may be implemented in firmware, hardware, software, or any grouping thereof. The exact implementation may depend on a number of factors such as the environment, the technology, used application, etc. Implementations which may comply with this usual include electronic devices (e.g., VLSI chip packages), micro- processors using Read Only Memory (ROM), Programmable Read Only Memory (PROM), or Electronically Erasable Read Only Memory (EEROM), and mainframe computers using Random-access Memory (RAM). When the algorithm is implemented in firmware or software, the processor on which the algorithm implements must be specific as part of the legalization process. Implementations of the algorithm which are validated and tested by NIST will be measured as complying with the standard. Note that FIPS 140-1 places additional requirements on cryptographic

Modules for Government use. Information regarding devices that have been  procedures and  validated for testing and validating equipment for conformance with this standard and FIPS 140-1 are existing from the National Institute of Standards and Technology, Computer Systems Laboratory, Gaithersburg, MD 20899.

Posted Date: 10/12/2012 8:44:08 AM | Location : United States

Related Discussions:- Implementations of cryptographic modules, Assignment Help, Ask Question on Implementations of cryptographic modules, Get Answer, Expert's Help, Implementations of cryptographic modules Discussions

Write discussion on Implementations of cryptographic modules
Your posts are moderated
Related Questions
role of school ,parents and peers imparting family life education

Hi i need help on how to write an anylitical essay on the topic above

I''m wondering if this sentence is grammatically correct? Do I need commas before and after "as well as"? This position will allow me to stay on my career of interest path, as wel

Fundamental issues in spatial analysis: Spatial analysis confronts many fundamental issues in the definition of its objects of study, in the construction of the analytic operation

WHAT FORCES ARE FUELING E-COMMERCE? There are as a minimum three main forces fuelling e-commerce- i.e. marketing and customer Interaction forces, economic forces and technol

Question 1 State the advantages and disadvantages of quantitative techniques Question 2 List down the guidelines for constructing a frequency distribution Question

#(2) Review the most recent Statement of Cash Flows and provide a brief analysis of the change in cash position over the last two years. (3) Go to Click on “News

what are the challenges faced when cataloguing periodical publications?

Digital Signatures Digital signatures are based on a grouping of the conventional idea of data hashing with public key-based encryption. Most hash functions are like to encrypt